Pages that link to "Item:Q3627450"
From MaRDI portal
The following pages link to A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks (Q3627450):
Displayed 29 items.
- Signature schemes secure against hard-to-invert leakage (Q290397) (← links)
- AES side-channel countermeasure using random tower field constructions (Q369425) (← links)
- Mutual information analysis: a comprehensive study (Q656515) (← links)
- On hardening leakage resilience of random extractors for instantiations of leakage-resilient cryptographic primitives (Q726335) (← links)
- Fully leakage-resilient signatures revisited: graceful degradation, noisy leakage, and construction in the bounded-retrieval model (Q729893) (← links)
- Horizontal collision correlation attack on elliptic curves (Q892284) (← links)
- Masking and leakage-resilient primitives: one, the other(s) or both? (Q892292) (← links)
- A Note on the Use of Margins to Compare Distinguishers (Q2794561) (← links)
- A Theoretical Study of Kolmogorov-Smirnov Distinguishers (Q2794562) (← links)
- ChipWhisperer: An Open-Source Platform for Hardware Embedded Security Research (Q2794592) (← links)
- Optimal Amplification of Noisy Leakages (Q2799099) (← links)
- Near Collision Side Channel Attacks (Q2807214) (← links)
- Fast and Memory-Efficient Key Recovery in Side-Channel Attacks (Q2807219) (← links)
- Correlation Power Analysis of Lightweight Block Ciphers: From Theory to Practice (Q2822694) (← links)
- A First-Order Leak-Free Masking Countermeasure (Q2890002) (← links)
- A New Difference Method for Side-Channel Analysis with High-Dimensional Leakage Models (Q2890018) (← links)
- Getting More from PCA: First Results of Using Principal Component Analysis for Extensive Power Analysis (Q2890021) (← links)
- Complementing Feistel Ciphers (Q2946868) (← links)
- Higher-Order Side Channel Security and Mask Refreshing (Q2946888) (← links)
- Improving DPA by Peak Distribution Analysis (Q3084258) (← links)
- Affine Masking against Higher-Order Side Channel Analysis (Q3084260) (← links)
- PKDPA: An Enhanced Probabilistic Differential Power Attack Methodology (Q3104719) (← links)
- Formal Analysis of the Entropy / Security Trade-off in First-Order Masking Countermeasures against Side-Channel Attacks (Q3104720) (← links)
- Leakage-Resilient Signatures (Q3408204) (← links)
- Multivariate Leakage Model for Improving Non-profiling DPA on Noisy Power Traces (Q3454163) (← links)
- An Optimal Key Enumeration Algorithm and Its Application to Side-Channel Attacks (Q3455513) (← links)
- Impossibility of Black-Box Simulation Against Leakage Attacks (Q3457063) (← links)
- A Leakage-Resilient Mode of Operation (Q3627451) (← links)
- Asymptotic information leakage under one-try attacks (Q5740624) (← links)